Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mikael SkoglundKTH Royal Institute of TechnologyVerified email at kth.se
Taejoon KimProfessor of EECS, The University of KansasVerified email at ku.edu
Mats BengtssonInformation Science and Engineering, KTH Royal Institute of TechnologyVerified email at kth.se
James GrossKTH Royal Institute of Technology, StockholmVerified email at ee.kth.se
Sahar ImtiazPhD StudentVerified email at kth.se
Carlo FischioneProfessor, KTH, EECS, Network and Systems EngineeringVerified email at kth.se
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Natasha AlkhatibCybersecurity researcher and engineer at ETAS BOSCHVerified email at telecom-paris.fr
Hossein S. GhadikolaeiEricssonVerified email at kth.se
Muhammad Mahboob Ur Rahman, SM...Associate Prof. at ITU, Lahore, and Research Scientist at KAUST, KSAVerified email at kaust.edu.sa
Maria MushtaqAssociate Professor at Telecom ParisVerified email at telecom-paris.fr
Gabor FodorEricsson Research and KTH Royal Institute of TechnologyVerified email at ericsson.com
Georgios KoudouridisIndustryVerified email at kth.se
Ghaya Rekaya-Ben OthmanTelecom ParisVerified email at telecom-paris.fr
Jiguang HeTII & University of Oulu, IEEE Senior MemberVerified email at oulu.fi
José Mairton Barros da Silva Jr.Assistant Professor, Uppsala UniversityVerified email at it.uu.se
Constantinos B. PapadiasAssociate Vice President, Research, Innovation & Graduate StudiesVerified email at acg.edu
Rami MochaourabScaniaVerified email at scania.com
Michael HonigProfessor of Electrical Engineering and Computer Science, Northwestern UniversityVerified email at eecs.northwestern.edu
Antti TölliProfessor of Wireless Communications, University of OuluVerified email at oulu.fi
Follow![Hadi Ghauch](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=-uDDcEkAAAAJ&citpid=6)